6 Google Chrome Extensions Expose User Information
Briefly

Research from Symantec highlights security risks associated with six Google Chrome extensions that inadvertently transmit sensitive user data without encryption through HTTP. Key vulnerabilities include the exposure of machine IDs, browsing domains, and other critical information, making users susceptible to Man-in-the-Middle attacks. Experts call for rigorous security policies regarding browser extensions, emphasizing the need for secure coding practices. By preventing hard-coding of API keys and enforcing the use of HTTPS, organizations can enhance their digital security posture against potential data breaches and exploitative attacks.
The emergence of widely used Google Chrome extensions that leak API keys and transmit data without encryption through HTTP poses a serious and complex threat. The lack of encryption for sensitive information, such as browsing domains and machine IDs, significantly endangers user privacy, making them susceptible to man-in-the-middle attacks, where malicious entities can intercept or modify data.
Companies need to adopt a foundational strategy for managing their digital presence to secure Google Chrome environments. Initially, they should implement stringent policies for approved browser extensions and ensure thorough vetting, emphasizing secure communication and credential management.
Read at Securitymagazine
[
|
]